From 9e3afbd32140c52fb34018d3dcbb1e079db0dbd2 Mon Sep 17 00:00:00 2001 From: Xe Iaso Date: Tue, 14 Jan 2025 14:11:12 -0500 Subject: CVE-2024-12084 Signed-off-by: Xe Iaso --- .../no-way-to-prevent-this/CVE-2024-12084.md | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 lume/src/shitposts/no-way-to-prevent-this/CVE-2024-12084.md (limited to 'lume/src') diff --git a/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-12084.md b/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-12084.md new file mode 100644 index 0000000..2baab92 --- /dev/null +++ b/lume/src/shitposts/no-way-to-prevent-this/CVE-2024-12084.md @@ -0,0 +1,20 @@ +--- +title: '"No way to prevent this" say users of only language where this regularly happens' +date: 2025-01-14 +series: "no-way-to-prevent-this" +type: blog +hero: + ai: "Photo by Andrea Piacquadio, source: Pexels" + file: sad-business-man + prompt: A forlorn business man resting his head on a brown wall next to a window. +--- + +In the hours following the release of [CVE-2024-12084](https://www.openwall.com/lists/oss-security/2025/01/14/3) for the project [rsync](https://rsync.samba.org/), site reliability workers +and systems administrators scrambled to desperately rebuild and patch all their systems to fix a heap-based buffer overflow in the rsync daemon allows an attacker to perform out-of-bounds writes with improperly formed checksums in the wire protocol. This is due to the affected components being +written in C, the only programming language where these vulnerabilities regularly happen. "This was a terrible tragedy, but sometimes +these things just happen and there's nothing anyone can do to stop them," said programmer Prince Isac Daniel, echoing statements +expressed by hundreds of thousands of programmers who use the only language where 90% of the world's memory safety vulnerabilities have +occurred in the last 50 years, and whose projects are 20 times more likely to have security vulnerabilities. "It's a shame, but what can +we do? There really isn't anything we can do to prevent memory safety vulnerabilities from happening if the programmer doesn't want to +write their code in a robust manner." At press time, users of the only programming language in the world where these vulnerabilities +regularly happen once or twice per quarter for the last eight years were referring to themselves and their situation as "helpless." -- cgit v1.2.3